Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4
Other than that the most time you can save by running clever attacks. |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 05:59 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
targeted wordlists, targeted rules, more narrow masks, … |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:24 PM |
|
|
Thread: Line-length exception
Post: RE: Line-length exception
hashcat cannot find your hash file. |
|
undeath |
hashcat
|
2 |
2,006 |
04-26-2018, 11:45 PM |
|
|
Thread: Can anyone help me
Post: RE: Can anyone help me
you haven't happened to follow the suggestions hashcat gave you, have you?
Quote:
--
You are STRONGLY encouraged to use the drivers listed in docs/readme.txt.
--
|
|
undeath |
hashcat
|
3 |
3,116 |
04-27-2018, 06:13 PM |
|
|
Thread: Need Help On Weird Problem
Post: RE: Need Help On Weird Problem
A fundamental feature of a cryptographic hash function is that this is not possible. So no. |
|
undeath |
hashcat
|
3 |
2,661 |
04-30-2018, 09:06 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
first you need to find out how exactly the hash is generated |
|
undeath |
hashcat
|
5 |
5,007 |
05-01-2018, 03:30 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
It could also be some custom scheme. There is an unlimited number of ways to do salted iterated hashing. |
|
undeath |
hashcat
|
5 |
5,007 |
05-01-2018, 03:50 PM |
|
|
Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working
sounds like a broken opencl runtime. Does the same happen without -t option? |
|
undeath |
hashcat
|
4 |
3,114 |
05-07-2018, 05:20 PM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
dict is too small. You might need to do this attack differently. |
|
undeath |
hashcat
|
5 |
3,426 |
05-07-2018, 07:23 PM |
|
|
Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working
Your nvidia opencl runtime, not your intel one. Try reinstalling the graphics driver. |
|
undeath |
hashcat
|
4 |
3,114 |
05-07-2018, 07:24 PM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
efficient attack, ugly edition:
combine salt with each dict word and run -a3 with the mask only
alternatively use --stdout and simply pipe in the -a6 candidates. You don't have proper status but it's... |
|
undeath |
hashcat
|
5 |
3,426 |
05-07-2018, 09:26 PM |
|
|
Thread: Hashcat 4.1.0 slow speed
Post: RE: Hashcat 4.1.0 slow speed
static mask prefix is bad for performance |
|
undeath |
hashcat
|
6 |
3,903 |
05-12-2018, 11:30 AM |
|
|
Thread: beginner help, best method?
Post: RE: beginner help, best method?
No reason to use maskprocessor for such a simple mask attack. WPA is a rather slow hash mode and nine characters is rather long for a brute force. Find more clever attacks or die cracking. |
|
undeath |
hashcat
|
6 |
3,771 |
05-12-2018, 11:34 AM |
|
|
Thread: Crack my BlockChain.info wallet 1 password
Post: RE: Crack my BlockChain.info wallet 1 password
I'm not sure why you even installed python, then stopped midway and tried to run the wallet file itself.
You need this python script to extract the necessary information from the wallet file: https... |
|
undeath |
hashcat
|
12 |
10,833 |
05-12-2018, 11:37 AM |
|
|
Thread: Increment knowing the last chars of password
Post: RE: Increment knowing the last chars of password
you can use attack mode 7 with a single-line dict |
|
undeath |
hashcat
|
2 |
2,038 |
05-12-2018, 11:46 AM |
|
|
Thread: Crack my BlockChain.info wallet 1 password
Post: RE: Crack my BlockChain.info wallet 1 password
it should output a string starting with $blockchain$ |
|
undeath |
hashcat
|
12 |
10,833 |
05-12-2018, 05:11 PM |
|
|
Thread: Crack my BlockChain.info wallet 1 password
Post: RE: Crack my BlockChain.info wallet 1 password
apparently there are different schemes used for encrypting blockchain v1 wallets, according to this post: https://bitcointalk.org/index.php?topic=1012475.msg11105755#msg11105755
I'm not sure if the... |
|
undeath |
hashcat
|
12 |
10,833 |
05-12-2018, 09:45 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
you won't complete that brute force attack within your lifetime with a single high end gpu. |
|
undeath |
hashcat
|
16 |
9,777 |
05-13-2018, 11:38 AM |
|
|
Thread: Crack my BlockChain.info wallet 1 password
Post: RE: Crack my BlockChain.info wallet 1 password
simply delete the characters from the end |
|
undeath |
hashcat
|
12 |
10,833 |
05-13-2018, 02:25 PM |
|
|
Thread: Cooling
Post: RE: Cooling
GOD Wrote: (05-15-2018, 12:39 PM)
--
Looks like he's talking about GPU not CPU.
--
GPUs have thermal paste, too |
|
undeath |
hashcat
|
10 |
7,557 |
05-15-2018, 12:52 PM |